First and foremost, I am not a big fan of “compliance.” I say that with some reluctance because there are certainly some positive aspects of the notion. The PCI/DSS standard provides an effective and comprehensive framework that organizations can use to help shape...

3 Simple Rules to Avoid Being a Cyber Victim I think it was Walt Kelly, the famous cartoonist, who said “We have met the enemy and he is us.” How true that sentiment is when it comes to cyber security, and the Hackers know it. In spite of the diligent efforts of...

The U.S. government views cyberspace as just another theater of war akin to air, land and sea, and it operates in the domain for one basic reason: national defense. Last in a six-part series on the motivations that compel nation-states to hack. The United States...

Israel’s tenuous position in the world drives its leaders to stay ahead of its cyber adversaries, chief among them the Islamic Republic of Iran. Fifth in a series on the motivations that compel nation-states to hack. Israel’s intelligence corps, Unit 8200,...

FOUR THINGS COMPANIES SHOULD DO RIGHT NOW TO IMPROVE THEIR CYBER SECURITY Everyone has an opinion, particularly when it comes to keeping your company safe from cyber- attacks. We are all under constant bombardment by vendors pushing the next best solution that will...

Fourth in a series on the motivations that compel nation-states to hack. The timing of the invitation to address a joint session of the U.S. Congress from Speaker of the U.S. House of Representatives John Boehner to Israeli Prime Minister Benjamin Netenyahu couldn’t...